Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: WFH Summer 2020
Threaded  |  Newest First  |  Oldest First
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
7/17/2020 | 10:42:48 AM
Write a caption & Win a prize!
Start your weekend with a smile! enter our new caption contest. 
Kaurik
Kaurik,
User Rank: Apprentice
7/22/2020 | 9:16:54 AM
Re: Write a caption & Win a prize!
I am the lord of my castle.
c0da
c0da,
User Rank: Apprentice
8/6/2020 | 5:17:08 PM
Re: Write a caption & Win a prize!
The superior method of sandboxing called "sandcastling" involves having the user detonate the malware.
pmauriks
pmauriks,
User Rank: Strategist
7/19/2020 | 7:57:00 PM
WFH Summer 2020
Defense in depth. Stuart makes sure to prevent shoulder surfing when working outside the office.
Deadsnott
Deadsnott,
User Rank: Strategist
7/20/2020 | 7:47:49 AM
Sandcastle environment
Dad, are you sure they didn't say open the app in a sand "box"?
pmauriks
pmauriks,
User Rank: Strategist
7/22/2020 | 3:19:22 AM
WFH Summer 2020
Well, working from home doesn't mean ignoring physical security!
JoeAllDay
JoeAllDay,
User Rank: Apprentice
7/22/2020 | 12:27:17 PM
WFH Summer 2020
I know it's made of sand, but you just let me enjoy it for as long as possible?
nschuetter
nschuetter,
User Rank: Apprentice
7/24/2020 | 12:02:58 PM
WFH Summer 2020
I've got a big project I'm almost done with, kids.  I'll shut the computer and come play with you once the tides have turned.
JohnM217
JohnM217,
User Rank: Strategist
8/13/2020 | 3:29:26 PM
Re: WFH Summer 2020
It's a technique known as breaking out of the sandbox kids.
Wondergirl
Wondergirl,
User Rank: Apprentice
7/24/2020 | 2:38:04 PM
Name That Toon: WFH Summer 2020
"Hope this works, kids! The article said to put the virus in a sandbox!"
GeorgeL92601
GeorgeL92601,
User Rank: Apprentice
7/27/2020 | 6:28:06 PM
WFH Summer 2020
Well, the spec sheet did say it offered the most granular security controls to protect remote employees!
lakers85
lakers85,
User Rank: Strategist
7/28/2020 | 8:58:44 AM
Fun at the Beach
...your gonna need a bigger castle
Tempest2004
Tempest2004,
User Rank: Strategist
7/28/2020 | 10:23:28 PM
Sand Castle
Confident in the size of his perimiter defense, he never saw the beach ball heading for the back of his head.
matthewkmiller
matthewkmiller,
User Rank: Strategist
7/31/2020 | 3:12:11 PM
Sandcastle
Sandboxing? Ppphhht! I've moved beyond sandboxes to sandcastles.
TonyMPE1
TonyMPE1,
User Rank: Apprentice
8/4/2020 | 6:44:32 AM
WFH Summer 2020
Dave's family were thinking his Zero Trust approach was becoming an addiction.
christopherrae
christopherrae,
User Rank: Apprentice
8/6/2020 | 11:55:03 AM
Re: Write a caption & Win a prize!
The proof-of-concept project quickly expanded beyond a sandbox and into a full beach. 
acampbell448
acampbell448,
User Rank: Ninja
8/13/2020 | 10:01:54 AM
Zoom meeting?
They said you could use Zoom anywhere.......
dannoman
dannoman,
User Rank: Strategist
12/17/2020 | 6:16:48 AM
Um, Dad?
"I don't think this is what your boss meant by work from home."


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40785
PUBLISHED: 2022-09-26
Unsanitized input when setting a locale file leads to shell injection in mIPC camera firmware 5.3.1.2003161406. This allows an attacker to gain remote code execution on cameras running the firmware when a victim logs into a specially crafted mobile app.
CVE-2022-3103
PUBLISHED: 2022-09-26
off-by-one in io_uring module.
CVE-2022-28721
PUBLISHED: 2022-09-26
Certain HP Print Products are potentially vulnerable to Remote Code Execution.
CVE-2022-28722
PUBLISHED: 2022-09-26
Certain HP Print Products are potentially vulnerable to Buffer Overflow.
CVE-2022-3204
PUBLISHED: 2022-09-26
A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameservers. The attack starts by querying a resolver for ...